Minos: Architectural support for protecting control data
暂无分享,去创建一个
[1] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[2] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[3] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[4] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Konrad Lai,et al. Supporting ada memory management in the iAPX-432 , 1982, ASPLOS I.
[6] David A. Patterson,et al. Computer Architecture - A Quantitative Approach (4. ed.) , 2007 .
[7] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[8] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[9] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[10] Frederic T. Chong,et al. Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities , 2005, DIMVA.
[11] George Varghese,et al. Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[12] Darko Kirovski,et al. A Hardware-Software Platform for Intrusion Prevention , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[13] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[14] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[15] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[16] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[17] Joel S. Emer,et al. Techniques to reduce the soft error rate of a high-performance microprocessor , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..
[18] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[19] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[20] Jan Vitek,et al. Efficient intrusion detection using automaton inlining , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[21] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[22] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[23] Frederic T. Chong,et al. A security assessment of the minos architecture , 2005, CARN.
[24] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[25] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[26] Jun Yang,et al. Fast Secure Processor for Inhibiting Software Piracy and Tampering , 2003, MICRO.
[27] Tal Garfinkel,et al. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation , 2005, USENIX Security Symposium.
[28] Henry M. Levy,et al. Capability-Based Computer Systems , 1984 .
[29] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[30] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[31] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[32] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[33] Miodrag Potkonjak,et al. Enabling trusted software integrity , 2002, ASPLOS X.
[34] Jun Yang,et al. Fast secure processor for inhibiting software piracy and tampering , 2003, Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitecture, 2003. MICRO-36..
[35] Coniferous softwood. GENERAL TERMS , 2003 .
[36] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[37] S. Zielinski,et al. International Court of Justice , 2002, International Organization.
[38] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[39] C. Kozyrakis,et al. Deconstructing Hardware Architectures for Security , 2006 .
[40] Timothy Fraser,et al. LOMAC: Low Water-Mark integrity protection for COTS environments , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[41] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[42] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[43] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[44] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[45] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[46] Nathanael Paul,et al. Where's the FEEB? The Effectiveness of Instruction Set Randomization , 2005, USENIX Security Symposium.
[47] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[48] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.